Software  >  

Malware

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
26 - 50 of 935 Matches Previous Page  |  Next Page
DDoS Attack Stats & Trends
sponsored by Akamai
RESOURCE: This infographic shows you crucial DDoS findings for Q1 of 2016. Learn how drastically DDoS attacks have increased, which industries they've affected the most and what you can do to protect your network.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

Akamai

Why DDoS Prevention Appliances are So Important Today
sponsored by Arbor Networks
WHITE PAPER: Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market, giving a solid overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these kinds of nefarious attacks..
Posted: 16 Aug 2016 | Published: 13 Jun 2016

Arbor Networks

Ransomware: Attack Trends, Prevention, and Response
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Deepen your understanding of ransomware, and learn how to better protect your business assets from these attacks. Uncover the challenges enterprises face and find best practices to prevent future ransomware attacks and limit their impact on your organization.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

Check Point Software Technologies Ltd.

Industry Assessment: Key Findings on Effective Threat Protection
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report shows the results of an engineering analysis for threat detection, techniques, and management strategies. Discover how one threat protection platform was tested using five key criteria.
Posted: 12 Aug 2016 | Published: 17 Mar 2016

Check Point Software Technologies Ltd.

Web Application Security: Is your Site Vulnerable to Attackers?
sponsored by Akamai
RESOURCE: This short infographic shows you the importance of intelligent security for your web applications including the necessity of a web application firewall (WAF). Learn how to seamlessly integrate and manage a cloud-based WAF to keep hackers out of your business.
Posted: 12 Aug 2016 | Published: 01 Jul 2016

Akamai

Protect Your Websites and Web Applications from Downtime and Data Theft
sponsored by Akamai
WHITE PAPER: This white paper teaches you how to put a security strategy in place that lets you expand your business without constantly watching the door for intruders. Learn how to reduce your risk for a cyberattack, but also maintain performance if a cyberattack should hit.
Posted: 12 Aug 2016 | Published: 01 Jul 2016

Akamai

Ransomware: Attack Trends, Prevention, and Response
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Deepen your understanding of the threat of ransomware. Access this white paper and explore ways to better protect your business assets with best practices for attack prevention.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Check Point Software Technologies Ltd.

Tranforming your Security
sponsored by Fortinet, Inc.
WHITE PAPER: Fortunately, we're entering into a new era of firewall technology for your modern, borderless network. Discover how to consolidate network security across your entire threat surface, thus increasing security effectiveness and reducing complexity. Gain central visibility and control of your network, managed through a single pane of glass.
Posted: 11 Aug 2016 | Published: 01 Jul 2016

Fortinet, Inc.

Ransomware: What You Need to Know
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.
Posted: 10 Aug 2016 | Published: 20 Jul 2016

Check Point Software Technologies Ltd.

Overcoming the challenges presented by mobility in the enterprise
sponsored by IBM MaaS360
WEBCAST: This webinar shows you the granular management controls that you need working at the app and data levels. Learn how to leave the personal user experience unaffected while better securing corporate data.
Posted: 10 Aug 2016 | Premiered: May 25, 2016

IBM MaaS360

Insider Threat Spotlight Report
sponsored by Exabeam
WHITE PAPER: High profile security breaches underline the need for better security practices and solutions to reduce the risks posed by insiders. Read this research report from the LinkedIn Information Security Community to gain more insight into the state of insider threats and the solutions your peers plan to implement to prevent them.
Posted: 10 Aug 2016 | Published: 01 Jul 2016

Exabeam

The Definitive Guide to Data Loss Prevention Healthcare Edition
sponsored by Digital Guardian
WHITE PAPER: This comprehensive guide provides what you need to understand, evaluate, and succeed with DLP in healthcare systems. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts.
Posted: 09 Aug 2016 | Published: 01 Jul 2016

Digital Guardian

Why Micro-Segmentation Matters Now
sponsored by VMware
WHITE PAPER: Cybercriminals count on the fact that data center security is still based on a penetrable, hardware-centric model. Access this white paper to learn how the advent of network virtualization empowered by micro-segmentation changes the economics, ease and speed of data center security, eliminating long-standing vulnerabilities.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

VMware

A SECURITY MANAGER'€™S GUIDE TO VENDOR RISK MANAGEMENT
sponsored by BitSight
WHITE PAPER: Vendor risk management (VRM) is a critical business practice. Within the pages of this guide, security professionals will learn about basic questions you need to ask all vendors and the impact of continuous risk monitoring software.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

BitSight

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

ComputerWeekly.com

Securosis: Securing Hadoop: Security Recommendations for Hadoop Environments
sponsored by Vormetric
ANALYST REPORT: This research paper lays out a series of recommended security controls for Hadoop, along with the rationale for each. The analysis is based upon conversations with dozens of data scientists, developers, IT staff, project managers, and security folks from companies of all sizes; as well as decades of security experience the Securosis team brings.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Vormetric

Bloor: For the EU's New Data Protection Regulation, Encryption Should Be the Default
sponsored by Vormetric
WHITE PAPER: This report by Bloor Research discusses the changes being made to the EU data protection landscape and suggests that encryption should be the default choice for protecting data. Discover how you can make it part of a comprehensive, consistent data security strategy.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Vormetric

Webcast - Enhancing Enterprise Security in 2016 – Part 3
sponsored by Intel
WEBCAST: This webcast informs you on the critical need for security intel sharing and how best to accomplish your sharing goals. Enable your organization to mitigate threats proactively while allowing other organizations to do the same.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Webcast - Enhancing Enterprise Security in 2016 – Part 2
sponsored by Intel
WEBCAST: Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Enhancing Enterprise Security in 2016
sponsored by Intel
WEBCAST: In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

The Threat Defense Lifecycle — Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn how to navigate the new world of cyber threats and security tools while maintaining an open mind towards new strategies and priorities. Collaborate with business pros and innovate to fortify existing defenses and establish new bulwarks against threats lurking around the corner.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

The Threat Defense Lifecycle — Reducing the Time to Discover and Recover
sponsored by Intel Security
WHITE PAPER: You need a new philosophy that'll reduce manual intervention, cut management complexity and optimize existing resources in order to reduce mitigation times. Discover an automated, analytics driven threat defense lifecycle that will give you the best opportunity for long-term, sustainable success in staying in front of security threats.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Seven Steps to Ease the Pain of Managing a SOC
sponsored by Intel Security
WHITE PAPER: Discover seven steps that will help SOC managers improve their ability to spot and eradicate threats at several points in the IT ecosystem, from the data center to the endpoint, both onpremises and in the cloud. Learn new, real-world solutions that simplify management, improve detection, and increase the speed of mitigation.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

If A Hacker Wants Your Data, Make Sure They Really Work For It
sponsored by Carbon Black
ESSENTIAL GUIDE: This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.
Posted: 28 Jul 2016 | Published: 25 Jul 2016

Carbon Black
26 - 50 of 935 Matches Previous Page    1 2 3 4 5    Next Page
 
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement